Switch hacker Hexkyz has released an update to tx_unpacker, a script to unpack and decrypt Team Xecuter‘s infamous SX OS. Credit goes to hexkyz and Naehrwert for the tool.
The hackers have not stated any goal in reverse engineering Team Xecuter’s OS besides the challenge of it. However there’s no doubt that some people on the scene are hoping to find ways to replicate Team Xecuter’s “backup” loading mechanism, without having to buy a license for their controversial Custom Firmware. Others are already thinking that with a few changes, one could simply boot a modified version of the SX Custom Firmware, that does not check for the tool’s license.
tx_unpacker only extracts the binaries for the Custom Firmware. Reverse engineering them is another story.